lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 13 Jan 2018 16:46:50 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4086-1] libxml2 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4086-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 13, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libxml2
CVE ID         : CVE-2017-15412
Debian Bug     : 883790

Nick Wellnhofer discovered that certain function calls inside XPath
predicates can lead to use-after-free and double-free errors when
executed by libxml2's XPath engine via an XSLT transformation.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.9.1+dfsg1-5+deb8u6.

For the stable distribution (stretch), this problem has been fixed in
version 2.9.4+dfsg1-2.2+deb9u2.

We recommend that you upgrade your libxml2 packages.

For the detailed security status of libxml2 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/libxml2

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=TV2m
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux - Powered by OpenVZ